Monday, August 6, 2012

"CYBER-SURVEILLANCE: A CASE STUDY IN DEVELOPMENT & POLICY"-REFERENCES-REV. PROPOSAL-Richard S.Y. Kim, Ph.D. City Unversity of New York, All Rights Reserved, 2008

SUR References Alderman v. United States, 394 U.S. 165 (1969) Alberti, A. (2002). Wiretaps: a complete guide for law and criminal justice professionals. Ft. Lauderdale: Austin & Winfield Publishers. Ballard, J.D., Hornik, J.G., Mckenzie, D. (2002). Technological facilitation of terrorism: definitional, legal and policy issues. American Behavioral Scientist, 45,958-989. Barker, J. (2004). “Comment: Society’s carnivore, both good and bad, why we need it, and how to regulate it.” 74 UMKC L. Rev. 945. Benn, S. (1971). Privacy, freedom, and respect for persons. In J. Pennock and J. Chapman. (Eds.) Privacy. (pp.1-27). New York: Atherton. Bereano, P. (1999). Technology and human freedom. In M.D. Ermann, M.B. Williams, C. Gutierrez. (Eds.). Computer, ethics, society. (pp.278-84). New York: Oxford University Press. Berger v. New York, 388 U.S.41 (1967) Borsook, P. (2000). Cyberselfish: A critical romp through a terribly libertarian culture of high tech. New York: Public Affairs. Center for Strategic & International Studies. (1998, November). Cybercrime……cyberterrorism……cyberwarfare: Averting an electronic waterloo. Retrieved June 1, 2001, from http://www.csis.org/pubs/cyberfor.html Carol, G. (1997). “Federal agencies open unified hard drive to control mafia.” New York Times, February 22. DeCew , J. (1986) The scope of privacy in law and ethics. Law and Philosophy, 5,145-173. DeCew, J. (1997). In pursuit of privacy: Law, ethics and the rise of technology. New York: Cornell University Press. Denning, D. (2000). Statement of Dorothy E. Denning. Retrieved June 4,2001, from http://www.house.gov/hasc/testimony/106thcongress/00-05-23denning.htm Denning, D. (2001). Information warfare and security. Boston: Addison and Wesley. Denzin, Norman K. and Yvonna S. Lincoln (eds.) (1994). Handbook of qualitative Research. Thousand Oaks, CA: Sage. Denzin, Norman K. and Yvonna S. Lincoln (eds.) (1998b). The Landmark of qualitative Research. Thousands Oaks, CA: Sage. Denzin, Norman K. Yvonna S. Lincoln (eds.) (1998c). Strategies of qualitative Inquiry. Thousand Oaks, CA: Sage. Ditzion, R. (2003). “Electronic surveillance in the internet age: a strange case of pen registers.” 41 Am. Crim. L. Rev. 1321. Dowley, M. (2002). Government surveillance under the U.S.A. PATRIOT ACT: Is it possible to protect national security and privacy at the same time? A constitutional tug of war. 36 Suffolk U. L. Rev. 165,182. Douglas, J.D. (Ed.). (1971). The technological threat. Englewood Cliffs: Prentice Hall. Drozdova, E.A. (2001). Civil liberties and security in cyberspace. In. A. Sofaer & S.E. Goodman (Eds.). Transnational dimensions of cybercrime and terrorism (pp.265-286). Stanford: Hoover Institution Press. Dunham, G. (2002), Carnivore, the FBI e-mail surveillance system: devouring criminals, not privacy. 54 Fed. Comm. L.J. 543, 566. Erbschloe, M. (2000). Business on the web is not worldwide. Retrieved July 7, 2002, from http://www.businesseconomic.com/cei/press.index. index.html Electronic Frontier Foundation, NSA spying FAQ, http://eff.org./nsa/faq Ellul, J. (1964). The technological society. New York: Vintage. Etzioni, A. (2002). Implications of select new technologies for individual rights and public safety. 15 Harv. J. Law & Tech 257. 290/ Etzioni, A. (1999). The Limits of privacy. New York: Basic Books. Fowler, G. (1977).Unmailable. Athens: University of Georgia Press. I Freedman vs. America On Line, Inc. 412 F. Supp.2nd (D. Conn, .2005). Freeh, L. (1997, June 4). Excerpts from testimony to the senate judiciary Committee. Retreived June 5, 2003, from Center for Democracy and Technology Web site: http://www.cdt.org/digi_tele/970604_Freeh.html Grabosky, P. (2001). Computer crime: A criminological overview. Forum on Crime and Society, 1, 2-53. Grabosky, P., Smith, R.G., Dempsey, G. (2001). Electronic theft: crimes of acquisition in cyperspace. Boston: Cambridge University Press. Gross, H. (1971). Privacy and autonomy. In J. Pennock and J. Chapman. (Eds.). Privacy. pp. 169-182. New York: Atherton. Gruber, A. (2007-2008). “Garbage pails and puppy dog tails: is that what Katz is made of?” 72 U.C. Davis L. Rev. 781. Gubin, T. (2008). “Note: Warshak v. United States: the Katz for electronic communication.” 23 Berkely Tech. L.J. 723. Haas. T.C. (2001). Carnivore and the fourth amendment. 34 Conn. L. Rev. 261, 290. Henderson, S. (2003-2004). “Nothing new under the sun: a technologically rational doctrine of fourth amendment search.” 72 Geo. Wash. L.J. 805. Hartzog, N. (2002). The “magic lantern” revealed: a report on the FBI’s new “key logging” Trojan analysis of possible treament in dynamic legal landscape. 20 J. Marshall J. Computer and Info. L. 287. Horn, K.A. (2002). Privacy versus protection: Exploring the boundaries of electronic surveillance in the internet age. 29 Fordham. Urb. L.J. 2223, 2274. Huberman, Michael A and Mathew B. Miles (1994) “Data management and analysis Methods” in Denzin, Norman K. and Yvonna S. Lincoln (eds). Handbook of qualitative research. Thousands Oaks, CA: Sage. Lessig, L. (1999). Code and other laws of cyberspace. New York: Basic Books. Katz v. United States, 389 U.S. 347 (1967). Kleinig, J. “Ethical perils of knowledge acquisition.” Kerr, O. (2002-2003). “Lifting the fog of internet surveillance: how a suppression remedy would change computer crime law.” 54 Hasting L.J. 805. Kerr, O. (2007) .http//www.volokh.com/archives/archive2007 02 04=2007 10/shtml#1170708253. Kerr, D.M. (2000). Statement for the record on internet and data interception capabilities developed by FBI before the United States House of Representatives. Retrieved December 8, 2002, from http://www.fbi.gov/congress00/kerr0724000. htm Krenn, P., Bem,D., Weissmann, A., (2008). “Mail Covers” (personal communications) USPIS. Washington DC, and New York City. Kubic, T. (2001). Statement for the record before the house committee on the judiciary subcommittee on crime. Retrieved July 29, 2002, from Information Warfare Web sites: http://wwww. iwar.org.uk.ecoespionage/use-cybercrime/kubic_061201.htm Kushner, H. (Ed.). (2002). Cyberterrorism in the 21st Century. Amer.ican Behavioral Scientist, 45. Lukas.S (2001). “Current and future capabilities.” Eds. A.Sofaer & S. Goodman, The tranational dimension of cyber crime and terrorism. Stanford University Press: Hoover Insitute. Merl, S. R. (2001). Internet communication standards for the 21st century: International terrorism must force the U.S. to adopt “carnivore” and new electronic surveillance standard. 27 Brooklyn. J. Int’l. 245, 278. Markoff, J. (2009). Worms infects millions of computers worldwide. New York Times, January 22. http//www.nytimes.com/2009/01/23/technology/internet/23worm.html. Markoff.J. (2009). Vast Spy System loots computers in 103 countries. New York Times, March 28. http://www.nytimes.com/2009/03/29/technology/29spy.html?_r=1 Marx, G. (1988). Undercover: Police surveillance. Berkeley: University California Press. Marx, G.( 1996). Privacy and technology. Teletronik, 1996. Marx, G. (1998). An ethics for the new surveillance. Information society, 3, pp. 77-54. Marx, G. (2001). Murky conceptual waters: public and the private Ethics and information technology, 3, 272-286. Mulgan, T. (2001). The demand of consequentialism. New York: Oxford University Press. Nance, A. (2002). Taking the fear out of electronic surveillance in the new age of terror. 70 UMKC. L. Rev. 751, 779. Nardone v. United States, 308, U.S. 338 (1939). Nisbet, R. (1971). The impact of technology on ethical decision making.” In J.A. Douglas (Ed.). The technological threat. Englewood Cliffs: Prentice Hall. Nissenbaum, H. (1998). Protecting privacy in the information age. Law and Philosophy. 17, 559-56. O’Connell, Paul. (2002). Intellectual history of COMPSTAT. Ph.D. Dissertation, CUNY Graduate Center, Department of Criminal Justice Olmstead v. United States, 277 U.S. 438 (1928) Oyama, K. (2006) “Note: E-mail privacy after United States v. Councilman: legislative options for amending ECPA.” 21 Berkely Tech. L.J. 499. Peterson, M. (1994). Sources in crime analysis. Westport: Greenwood Press. Pikowsky, R.A. (2002). An overview of the law of electronic surveillance post September 11, 2001. 94 Law Libr. J. 601, 619. Pipkin, D. (2000). Information Security. Upper Saddle River: Prentice Hall. Pollitt, M. (2001). Cyberterrorism---fact or fancy? Retrieved May 30, 2001from, http://cosc.georgetown.edu/~denning/infosec/pollitt/htm Power, R. (2000). The tangled web. Indianapolis: Que. Power, R. (2002). CSI/FBI computer crime and security survey. Computer Security: Issues and Trends, 7,1-17. Redina, P. (2008). Personal communication. USPIS. Washington D.C. Regan, P. (1995). Legistlating privacy. Chapel Hill: University of Carolina Press. Rein, M.,& Schon, D, (1977). Problem setting in policy research. In C. Weiss (Ed.) Using Social Policy Research in Public Policy. Lexington, MA: DC, Heath. Rosen, J. (2001). The unwanted gaze: The destruction of privacy in america.Vintage: New York, 2001. Sager, I., Hamm, S., Gross, N., Carey, J. (2001, February 12). Cybercrime. Business Week Online. Retrieved June 7, 2003, from Web site: http://businessweek.com/2000/00_08/b3669001.htm?scriptFramed. Salkever, A. (2001). A dark side to the FBI’s Magic Lantern: http://www.businessweek.com/bw.daily/dnflash/nov2001/nf20011127 5011.htm Sofaer, A., Goodman, S. (Eds.). (2001). The transnational dimension of cybercrime and terrorism. Stanford: Hoover Institution Press. Smith v. Maryland, 442 U.S. 735 (1979) Solove, D. (2002). Conceptualizing privacy. 90 Calif. L. Rev. 1087,1155. Solove, D. (2003-2004). “Reconstructing electronic surveillance law.” 72 Geo. Wash. L.J. 1264. Source Watch, RESTORE Act (2007). http.//sourcewatch.org/index.php?title=Restore_Act(2007_FISA_bill) Streeman, M. (2001). Cybercrime: liberty for security. Duke L. & Tech. Rev. 36 Strauss, Anselm and Juliet Corbin (1990). Basics of qualitative research: grounded theory procedures and techniques. Newbury Park. CA: Sage. Sunstein, C. (2000). Republic.com. Princeton: Princeton U P. Sutton, J.R. (2001). Law/society. Thousand Oaks: Sage. Thomson, J. (1974). The right to privacy. Philosophy and Public Affairs, 4, 295- 313. United States v. Choate, 567, F.2nd, 177 (9th Circ., 1978). United States v, Councilman, 418 F. 3rd 67 (1st Circ. 2005) ( en banc). United States v. Jacobsen, 466 U.S. 109 (1984). United States v. Herenandez, 313 F.3rd 1209 (9th Circ. 2002). United States v, Leon Van Leewen, 387 U.S, U.S. 249 (1970). United States v. Mark Stephen Forrester, 512 F.3d 500 (9th Circ. 2007) United States v. Ramsey, 431 U.S. 606 (1977). United States Department of State. (1996). The pattern of global terrorism. Washington, DC: Author. U.S. Department of Justice. (2002). Searching and seizing and obtaining electronic evidence in criminal investigation. United States Foreign Intelligence Surveillance Court of Review In Re Directives Pursuant to Section 105B of the Foreign Intelligence Act (2008). National Criminal Justice Reference Services. Federal wiretap manual. Van Den Haag, E. (1971). On privacy. In J. Pennock and J. Chapman.(Eds.). Privacy. (pp.149-169). New York: Atherton. Wall, D. (Ed.). (2002). Crime and the internet. London: Routledge. Weber, M. (1978). Economy and society: An outline of interpretive Sociology. Berkeley: University of California Press. Westin, A. (1967). Privacy and freedom. New York: Atheneum. Weinstein, W. (1971). The private and free: A conceptual inquiry. J. Chapman and J. Pennock. (Eds.). Privacy. (pp.27-56). New York: Atherton. Winner, Langdon. (1977). Autonomous technology: Technics as a theme in political thought. Cambridge: MIT Press. Williams, P. (2001). Organized crime, cybercrime: synergies, trends,Responses. Office of International Programs, U.S. Department of State. Retrieved June 7, 2003, from Information Warfare Website: http://www.iwar.org.uk/ecoespionage/resources/state/internet-crime.htm Wilson. C. (2008) CRS REPORT FOR CONGRESS; botnets, cybercrime, and cyberterrorism: vulnerabilities and policy issues for Congress. Congressional Research Service. Yeats, J. (2002). “CALEA and RIPA: the U.S. and U.K. technologies in the wireless world.” 12 Albany L.J. Sci and Technology Rev. Yin, Robert K. (1984). Case study research: design and methods. Newbury Park, CA: Sage. Yin, Robert K.(2003). Applications of case study research. Newbury Park, CA: Sage. Young, M. (2001). What big eyes and ears you have!: a new regime for covert governmental surveillance. 70 Fordham. L. Rev. 1017, 1109 VEILLANCE, CRIME & PHILOSOPHY & CULTURE

No comments:

Koryeo(Executive) Senior Editor, Robert Turly--Asian Art & Humanities

R.S.Y Kim, Ph.D., Order & Society of SS. Thomas and Bartholomew, who studied Law,_LIT, Math @ NYU; John Jay College of Criminal Justice/CUNY Graduate Center Research Foundation Fellow (Dept.Management, Law, Criminal Justice; CO-Editor-BEN LIU, BROWN U< West/East PSYCH: Senior Math/Stats Editor, Editor. S. VAN BEVERHAUT; Assoc. Communications Ed. Michael Reyes, Hamilton College: Hon. Supreme THEORETICAL MATHEMATICS ED. ALGIRDAS.T. University at LITHUANIA-POLAND;Film Editor-"Voltaire," SUNY-BINGHAMTON U. SR Assoc. Math.Ed. Arsen Yakubov, U of Israel-Princeton U----Advisory Board--Gautam Ramakrishna, MD,(EMERITUS) Executive Secretary, Nada Pues Nada (Mayo Clinic Research Group)- C. Lieberman, PhD, NYPD, Terrorism and Counter-Terrorism, Investigation and Policing Philosophy, John Jay College-University of New Haven(EMERITUS) *AFFIL=DULLES/BENTON/KLEINIG/SCHWARTZ/LEVINE/KIM/WANG PAN AMERICAN-ASIAN INSTITUTE FOR PEACE, WAR, ECONOMICS & JUSTICE-Legal and Political Advisor: Barry Latzer, JD, PhD (EMERITUS); ; ;Nicholas Birns PhD GPBNEW SCH0OL U=Executive V. President, B.Liu. Senior Ed. Glen Slaby--